All our services are made available under the acceptable use policy stated and exemplified here.
All our services are made available under the acceptable use policy stated and exemplified here.
You must not use – or encourage, promote, facilitate or instruct others to use – our services in any illegal, harmful, fraudulent, infringing or offensive way, or to transmit, store, display, distribute or otherwise give access to illegal, harmful, fraudulent, infringing or offensive content. Examples include content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
Our services must not be used to compromise or violate the security or integrity of any technical system, network, or software application. Prohibited activities include gaining unauthorized access (e.g. for or by attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures used by a system) and interception (monitoring of data or traffic on a system without permission).
You must not abuse our services, for example by applying manual or electronic means to bypass or lever-out any usage limitations like access and storage restrictions.
Penetration and security tests must have been approved by us beforehand.
Our services and the websites based on them must not be used to run file sharing or streaming sites or services and the like. Regardless of that, all traffic beyond the amount included in our plans will be charged.